WO2000025251A1 - System and method for detecting purchasing card fraud - Google Patents

System and method for detecting purchasing card fraud Download PDF

Info

Publication number
WO2000025251A1
WO2000025251A1 PCT/US1999/024836 US9924836W WO0025251A1 WO 2000025251 A1 WO2000025251 A1 WO 2000025251A1 US 9924836 W US9924836 W US 9924836W WO 0025251 A1 WO0025251 A1 WO 0025251A1
Authority
WO
WIPO (PCT)
Prior art keywords
fraud
contact event
event information
purchasing card
client
Prior art date
Application number
PCT/US1999/024836
Other languages
French (fr)
Inventor
Julie A. Geschwender
Michele Murphy-Houser
Original Assignee
First Data Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by First Data Corporation filed Critical First Data Corporation
Publication of WO2000025251A1 publication Critical patent/WO2000025251A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/403Solvency checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/403Solvency checks
    • G06Q20/4037Remote solvency checks

Definitions

  • This invention relates to a system and method for detecting and preventing purchasing card fraud during all phases of a purchasing card life cycle.
  • purchasing cards are defined as credit cards, debit cards, "Smart" cards (having IC chips), retail cards (such as gas cards), and the like.
  • the present invention provides a method and system for detecting purchasing card fraud during every aspect of a purchasing card life cycle.
  • a central fraud database is created for receiving known fraudulent or "high risk" personal information.
  • the personal information may include, the fraudulent name, fraudulent addresses, fraudulent phone numbers, fraudulent places of employment, criminal history, and other personal information for example.
  • the central fraud database receives information from a variety of sources including but not limited to proprietary databases, client fraud files, law enforcement, and USPS databases. After a contact event has a occurred the fraud database is scanned for a match between the contact event information and the contents of the fraud database. If a possible fraud match occurs the system sends a fraud alert to the client or user of the database.
  • the present invention has many advantages over the prior art for example the present invention has the capability to send fraud alerts in real time, "near" real time, or via batch to clients thus reducing or eliminating the damage caused by potential purchasing card fraud.
  • a method for detecting purchasing card fraud during all phases of a purchasing card life cycle.
  • the method includes obtaining contact event information from a client during a contact event, comparing the contact event information with information stored in a database, and sending a fraud alert to a client in real time, "near" real time, or via batch for communicating to the client that a potential fraud match has occurred.
  • the method allows for special handling of the contact event by the client or user of the database.
  • a system for detecting purchasing card fraud during all phases of a purchasing card life cycle has a computer database for receiving contact event information from a client, computer software in communication with the computer database for comparing the contact event information with information stored in the database, and a communication network for sending a fraud alert to a client in real time, "near" real time, or via batch for informing the client that a potential fraud match has occurred.
  • FIGURE 1 is a schematic representation of a purchasing card fraud detection system designed in accordance with the present invention
  • FIGURE 2 is a flow diagram of a preferred method of detecting purchasing card fraud in accordance with the present invention
  • FIGURE 3 is a flow diagram of a preferred fraud matching process
  • FIGURE 4 is a schematic representation of a preferred fraud database architecture.
  • the present invention provides a system and method for facilitating fraud prevention and detection for all contact events during a purchasing card life cycle.
  • Such contact events include 1) application processing; 2) card activation; 3) cardholder usage, including mail and telephone orders; and 4) maintenance events, such as name and address changes, PIN changes, plastic requests, and credit line increases.
  • the system of the present invention preferably includes a single, comprehensive risk database 10 for the detection of purchasing card fraud.
  • the risk database 10 may include information from various sources 12, as will be described below.
  • the risk database is preferably server-based and has connectivity, via a local area network 14 (LAN) or other network, to a mainframe 16.
  • the mainframe 16 is provided for on-line transactions involving the various contact events 18 described above.
  • Clients 20 are provided with connectivity to the risk database 10 for file transfer and general access, and are also provided connectivity to mainframe 16 (Graphical User Interface, dummy terminal or the like) for receipt of fraud alerts and queue information.
  • An optional, more limited database could be provided for non-contributors to the risk database.
  • a backup server is provided.
  • the system of the present invention possesses the technical functionality to pool data from multiple sources in multiple formats and to standardize reporting structure guidelines, enabling the risk database to function for many types of transactions or contact events 18.
  • the system provides the ability to query in real time, "near" real time, or via batch with on-line interfaces to the mainframe transactions.
  • limited client 20 resources are required for access.
  • a daily queue statistics report is developed at the client 20 level to identify all accounts that match the risk database 10, including the source of the data match.
  • reports are generated which track contributor statistics.
  • reporting is developed to track client statistics on a query basis, such as by the number of record transactions queried against the risk database 10, or by the number of records with a data match.
  • consortium fraud database 10 Possible sources for the consortium fraud database 10 include client databases, credit card issuer databases, credit bureau databases, research and investigation fraud files, ANI risk databases, the U.S. Postal Service NRI database, Account Takeover modeling/scoring, the Social Security Administration, the Department of Motor Vehicles, Western Union, Telecheck, the American Business List, law enforcement, court and public information records, phone directories, and direct mail surveys.
  • the available data includes, but is not limited to,
  • the proposed data element structure within the risk database preferably includes at least the following:
  • Fraudulent or potentially fraudulent home and business addresses, including P.O. Box, city, state, and zip code.
  • the risk database would act as a central repository for fraud data to be queried against by lenders and adjacent market users.
  • Potential primary users or clients include bank card issuers, non-bank card issuers, potential card issuers, oil card issuers, merchants, and retailers.
  • Possible secondary users include phone companies, DDA Account banks, and utility companies, among others.
  • the method of detecting potential purchasing card fraud of the present invention is outlined in the flow diagram of FIG. 2.
  • the method includes obtaining contact event information at the mainframe 16, as represented by block 50. Comparing the contact event 18 information to fraud information stored in the risk database 10, as represented by block 52. If a match is found between the contact event information and the fraud information, the method further includes issuing an on-line alert to the client and queuing the information for manual review by the particular client, as represented by block 54. If a match does not occur client 20 is notified as such and communication with risk database 10 is concluded, as represented by block 56.
  • a fraud match may be scored, as represented by block 58 and as will be explained below.
  • a score then communication with the database is concluded, as represented by block 60. However, if a client has elected to receive a match score, a scorecard is generated and sent to the client 20, as represented by block 62 and then communication with risk database is terminated at block 64.
  • contact event 18 transactions are preferably structured to create automatic queries which compare account record data elements against the fraud information stored in the risk database. If a match is found between the account data and the fraud data, then an alert message is generated by the system in real time, "near" real time, or via batch to the queue. In addition, the account record is sent to an on-line queue to be monitored and/or manually worked by the client. Upon entry to the queue, the contact event transaction is suspended or placed on hold until manual follow-up is completed. The contact event information may for example be purged from the database.
  • An additional feature of the present invention is to offer clients 18 the option of having matched fraud data records "scored" to assist in the decisioning/actioning processes when a record is queued.
  • a generic suite of scorecards is provided, while also allowing client-defined scorecards to be developed and implemented.
  • a scorecard is provided which predicts the likelihood of a fraudulent takeover of an existing, active, or inactive cardholder account.
  • PIN changes, plastic requests, credit line increases and changes to the account record.
  • the components of the invention are:
  • selected non-monetary transactions may be structured to create queries which compare account record data elements against the Consortium Risk Database 10 of the invention.
  • an account entry transaction 80 application processing, card activation, mail/phone order, address change, and the like
  • an alert message 84 would be generated by the system real time, "near" real time, or via batch.
  • the account record may be sent to an on-line queue 86 to be monitored and/or manually worked by the client.
  • the non- monetary transactions would be suspended or placed on hold until manual follow up is completed.
  • the accounts may be built on the system, however, plastic generation would be suspended.
  • Information residing within the queue would include the account record information, the reason for the alert (i.e. , potential fraudulent name, address, SSN, or phone number), and the contributing source of the matched data. This process will help to reduce responsibility /liability for data integrity.
  • clients will be provided the option of having matched fraud data records "scored" to assist in the decisioning/actioning processes when a record is queued, as represented by block 88.
  • a generic suite of scorecards 90 may be implemented as well as client- defined scorecards 92.
  • Usage incentives may also be provided for "global" contributors.
  • An example of a usage incentive may be reduced fees for accessing the fraud database.
  • Other incentives may include partial to full access to information contained in the fraud database.
  • a non-contributor to the consortium may be offered access to information that the database manager may have purchased or provided in a non- consortium database 100. Otherwise non-contributors may be restricted from information provided by "global" contributors to the Risk Consortium Database.
  • a consortium data warehouse contains data contributed from various business sources 110 including, but not limited to:
  • the data element structure 200 may include: • Name (Primary and Secondary and additional): First, Last,
  • the system and method of the present invention provide a single source of uniform data from various contributor business sources 210, increase the effectiveness of fraud detection efforts, allow clients 212 to reduce current manual processes for fraud identification and actioning, and allow pooling of data across the client base to improve the identification of repeat offenders.

Abstract

A method and system for detecting purchasing card fraud during every aspect of a purchasing card life cycle is provided. A central fraud database (10) is created for receiving potential fraud or 'high risk' information. The central database (10) receives information from various sources (12) and contact sources (18). After a contact event has taken place, the fraud database is scanned for a match between the contact event information and the contents of the fraud database (10). A fraud alert message including a scorecared is transmitted to client (20). The client (20) is given options to respond to the contact event such as suspending purchasing card generation.

Description

SYSTEM AND METHOD FOR DETECTING PURCHASING CARD FRAUD
TECHNICAL FIELD
This invention relates to a system and method for detecting and preventing purchasing card fraud during all phases of a purchasing card life cycle.
BACKGROUND ART
Roughly half a billion transactions with significant, but preventable, fraud potential occur in the United States each year. Purchasing card contact events that can lead to fraudulent occurrences include application processing, card activation, usage, such as mail and phone ordering, and maintenance events, such as address or other information changes. It is estimated that the total cost of fraud is $1.3 million for every one million gross active accounts, or $1.34 in fraud loss per gross active account (Sources: VISA/MC, Credit Card Prevention Sourcebook).
A large portion of this fraud could effectively be addressed though improved identification of known fraudulent names, fraudulent addresses, fraudulent phone numbers, fraudulent social security numbers, and other fraudulent personal information. In fact, a large number of fraud cases are typically perpetrated by repeat offenders or organized rings.
Current tools to combat repeat and organized fraud are still underdeveloped. While there are a myriad of sources for fraud-related information, the various sources focus on differing pieces of personal data and return fraudulent alerts in non-standard formats. In addition to the lack of uniformity of the alert information, current systems lack real time, "near" real time, or via batch functionality. Furthermore, no single comprehensive source exists that is capable of addressing fraud during the many stages of a purchasing card account. DISCLOSURE OF INVENTION
Therefore, it is an object of the present invention to provide a system and method for facilitating fraud prevention and detection at all stages of a purchasing card life cycle, wherein purchasing cards are defined as credit cards, debit cards, "Smart" cards (having IC chips), retail cards (such as gas cards), and the like.
It is another object of the present invention to provide a single comprehensive database of standardized fraud data from various contributory sources.
It is still another object of the present invention to allow clients to reduce manual processes for fraud detection.
In accordance with these and other objects, the present invention provides a method and system for detecting purchasing card fraud during every aspect of a purchasing card life cycle. A central fraud database is created for receiving known fraudulent or "high risk" personal information. The personal information may include, the fraudulent name, fraudulent addresses, fraudulent phone numbers, fraudulent places of employment, criminal history, and other personal information for example. The central fraud database receives information from a variety of sources including but not limited to proprietary databases, client fraud files, law enforcement, and USPS databases. After a contact event has a occurred the fraud database is scanned for a match between the contact event information and the contents of the fraud database. If a possible fraud match occurs the system sends a fraud alert to the client or user of the database. The present invention has many advantages over the prior art for example the present invention has the capability to send fraud alerts in real time, "near" real time, or via batch to clients thus reducing or eliminating the damage caused by potential purchasing card fraud.
Thus in accordance with one aspect of the present invention, a method is provided for detecting purchasing card fraud during all phases of a purchasing card life cycle. The method includes obtaining contact event information from a client during a contact event, comparing the contact event information with information stored in a database, and sending a fraud alert to a client in real time, "near" real time, or via batch for communicating to the client that a potential fraud match has occurred. Thus the method allows for special handling of the contact event by the client or user of the database.
In accordance with another aspect of the present invention, a system for detecting purchasing card fraud during all phases of a purchasing card life cycle is provided. The system has a computer database for receiving contact event information from a client, computer software in communication with the computer database for comparing the contact event information with information stored in the database, and a communication network for sending a fraud alert to a client in real time, "near" real time, or via batch for informing the client that a potential fraud match has occurred.
The above objects and other objects, features, and advantages of the present invention are readily apparent from the following detailed description of the best mode for carrying out the invention when taken in connection with the accompanying drawings.
BRIEF DESCRIPTION OF DRAWINGS
FIGURE 1 is a schematic representation of a purchasing card fraud detection system designed in accordance with the present invention;
FIGURE 2 is a flow diagram of a preferred method of detecting purchasing card fraud in accordance with the present invention;
FIGURE 3 is a flow diagram of a preferred fraud matching process; and FIGURE 4 is a schematic representation of a preferred fraud database architecture.
BEST MODE FOR CARRYING OUT THE INVENTION
The present invention provides a system and method for facilitating fraud prevention and detection for all contact events during a purchasing card life cycle. Such contact events include 1) application processing; 2) card activation; 3) cardholder usage, including mail and telephone orders; and 4) maintenance events, such as name and address changes, PIN changes, plastic requests, and credit line increases.
With reference to FIG. 1, the system of the present invention preferably includes a single, comprehensive risk database 10 for the detection of purchasing card fraud. The risk database 10 may include information from various sources 12, as will be described below. The risk database is preferably server-based and has connectivity, via a local area network 14 (LAN) or other network, to a mainframe 16. The mainframe 16 is provided for on-line transactions involving the various contact events 18 described above. Clients 20 are provided with connectivity to the risk database 10 for file transfer and general access, and are also provided connectivity to mainframe 16 (Graphical User Interface, dummy terminal or the like) for receipt of fraud alerts and queue information. An optional, more limited database (not shown) could be provided for non-contributors to the risk database. Preferably, a backup server is provided.
The system of the present invention possesses the technical functionality to pool data from multiple sources in multiple formats and to standardize reporting structure guidelines, enabling the risk database to function for many types of transactions or contact events 18. In addition, the system provides the ability to query in real time, "near" real time, or via batch with on-line interfaces to the mainframe transactions. Preferably, limited client 20 resources are required for access. In a preferred embodiment, at the mainframe 16 level, a daily queue statistics report is developed at the client 20 level to identify all accounts that match the risk database 10, including the source of the data match. Furthermore, at the server level, reports are generated which track contributor statistics. In addition, reporting is developed to track client statistics on a query basis, such as by the number of record transactions queried against the risk database 10, or by the number of records with a data match.
Possible sources for the consortium fraud database 10 include client databases, credit card issuer databases, credit bureau databases, research and investigation fraud files, ANI risk databases, the U.S. Postal Service NRI database, Account Takeover modeling/scoring, the Social Security Administration, the Department of Motor Vehicles, Western Union, Telecheck, the American Business List, law enforcement, court and public information records, phone directories, and direct mail surveys.
From such sources, the available data includes, but is not limited to,
1) personal information, such as addresses, phone numbers, and social security numbers used in known frauds; 2) valid US addresses and their nature, i.e. residential, commercial, or vacant; 3) valid address/name combinations; 4) high risk zip codes; 5) public information, such as bankruptcy filings, tax liens, and civil judgments; and 6) consumer and purchase data.
The proposed data element structure within the risk database preferably includes at least the following:
1. Names of fraudulent or potentially fraudulent ("high risk") primary, secondary, and additional cardholders in the form of first name, last name, and middle initial.
2. Fraudulent or potentially fraudulent ("high risk") home and business addresses, including P.O. Box, city, state, and zip code.
3. Fraudulent or potentially fraudulent ("high risk") home and business telephone numbers. 4. Fraudulent or potentially fraudulent ("high risk") social security numbers of primary, secondary, and additional cardholders.
The risk database would act as a central repository for fraud data to be queried against by lenders and adjacent market users. Potential primary users or clients include bank card issuers, non-bank card issuers, potential card issuers, oil card issuers, merchants, and retailers. Possible secondary users include phone companies, DDA Account banks, and utility companies, among others.
The method of detecting potential purchasing card fraud of the present invention is outlined in the flow diagram of FIG. 2. The method includes obtaining contact event information at the mainframe 16, as represented by block 50. Comparing the contact event 18 information to fraud information stored in the risk database 10, as represented by block 52. If a match is found between the contact event information and the fraud information, the method further includes issuing an on-line alert to the client and queuing the information for manual review by the particular client, as represented by block 54. If a match does not occur client 20 is notified as such and communication with risk database 10 is concluded, as represented by block 56. Optionally, a fraud match may be scored, as represented by block 58 and as will be explained below. If a client 20 does not wish to receive, a score then communication with the database is concluded, as represented by block 60. However, if a client has elected to receive a match score, a scorecard is generated and sent to the client 20, as represented by block 62 and then communication with risk database is terminated at block 64.
Within the system of the present invention, contact event 18 transactions are preferably structured to create automatic queries which compare account record data elements against the fraud information stored in the risk database. If a match is found between the account data and the fraud data, then an alert message is generated by the system in real time, "near" real time, or via batch to the queue. In addition, the account record is sent to an on-line queue to be monitored and/or manually worked by the client. Upon entry to the queue, the contact event transaction is suspended or placed on hold until manual follow-up is completed. The contact event information may for example be purged from the database.
An additional feature of the present invention is to offer clients 18 the option of having matched fraud data records "scored" to assist in the decisioning/actioning processes when a record is queued. Preferably, a generic suite of scorecards is provided, while also allowing client-defined scorecards to be developed and implemented. In a preferred embodiment, a scorecard is provided which predicts the likelihood of a fraudulent takeover of an existing, active, or inactive cardholder account.
The following attributes of the invention are thus possibly provided to facilitate fraud detection at all stages of a purchasing card life cycle:
• Application Processing
• Card Activation
• Cardholder Usage/Maintenance • Other Transaction or Contact Events: Priority Non-Mons:
PIN changes, plastic requests, credit line increases and changes to the account record.
The components of the invention are:
• Consortium Data Warehouse • Fraud Scoring
• Actioning (Alerts to On-Line Screens)
• Queuing for Manual Review
The Matching Process
As shown in Figure 3, selected non-monetary transactions may be structured to create queries which compare account record data elements against the Consortium Risk Database 10 of the invention. For example, during an account entry transaction 80 (application processing, card activation, mail/phone order, address change, and the like) could automatically compare key application data elements against the Data Warehouse or Risk Database 10. If a match is found, as represented by block 82, between the account and the Data Warehouse, then an alert message 84 would be generated by the system real time, "near" real time, or via batch. In addition, the account record may be sent to an on-line queue 86 to be monitored and/or manually worked by the client. Upon entry to the queue, the non- monetary transactions would be suspended or placed on hold until manual follow up is completed. In the case of new account entries and batch-entered new accounts, the accounts may be built on the system, however, plastic generation would be suspended.
Information residing within the queue would include the account record information, the reason for the alert (i.e. , potential fraudulent name, address, SSN, or phone number), and the contributing source of the matched data. This process will help to reduce responsibility /liability for data integrity.
Scoring of Matched Data
In further keeping with the invention, clients will be provided the option of having matched fraud data records "scored" to assist in the decisioning/actioning processes when a record is queued, as represented by block 88. This should provide business opportunities to build the appropriate scorecard logic. Accordingly, a generic suite of scorecards 90 may be implemented as well as client- defined scorecards 92.
Consortium Contributors
All consortium contributors will be allowed access to the entire data warehouse. Usage incentives may also be provided for "global" contributors. An example of a usage incentive may be reduced fees for accessing the fraud database. Other incentives may include partial to full access to information contained in the fraud database.
Non-Consortium User
A non-contributor to the consortium may be offered access to information that the database manager may have purchased or provided in a non- consortium database 100. Otherwise non-contributors may be restricted from information provided by "global" contributors to the Risk Consortium Database.
Summary of Benefits and Critical Needs Met
• Provides a single source of uniform data from various contributor business sources;
• Increases the effectiveness of fraud detection efforts;
• Allows clients to reduce current manual processes for fraud identification and actioning;
• Pools data across the client base to improve identification of repeat offenders.
Consortium Risk Data Warehouse
A consortium data warehouse contains data contributed from various business sources 110 including, but not limited to:
Clients; • Research and Investigation Fraud Files (Fraud App's and
Account takeovers (type lost 3,5,8));
Customer Service Fraud File Database;
Card Activation ANI Risk Database;
Postal NRI Database (high risk Zip Codes); • Social Security Administration compromised SSN's;
International Association of Financial Crimes Investigators;
Cellular or Pay Phone Numbers/Numbers used fraudulently;
Western Union Fraud Data;
American Business List (prison addresses, hospitals, etc.); • Account takeover modeling/scoring;
Potential model for Skimmin;
American Correctional Association;
Lexis/Nexis . Proposed Data Element Structure
As depicted in Figure 4, the data element structure 200 may include: • Name (Primary and Secondary and additional): First, Last,
Middle Initial;
Address: Home, Business (including PO Box); City; State; Zip Code;
Phone: Home, Business; • Social Security Number: Primary, Secondary;
High Risk Zip Codes (NRI data); and Known fraudulent accounts determined by type lost.
Therefore, the system and method of the present invention provide a single source of uniform data from various contributor business sources 210, increase the effectiveness of fraud detection efforts, allow clients 212 to reduce current manual processes for fraud identification and actioning, and allow pooling of data across the client base to improve the identification of repeat offenders.
While embodiments of the invention have been illustrated and described, it is not intended that these embodiments illustrate and describe all possible forms of the invention. Rather, the words used in the specification are words of description rather than limitation, and it is understood that various changes may be made without departing from the spirit and scope of the invention.

Claims

WHAT IS CLAIMED IS:
1. A method for detecting purchasing card fraud during all phases of a purchasing card life cycle, the method comprising: obtaining contact event information from a client during a contact event; comparing the contact event information with information stored in a database; and sending a fraud alert to a client in real time for communicating to the client that a fraud match has occurred.
2. A method of claim 1 wherein obtaining contact event information further comprises obtaining a customer's name, a customer's social security number, customer's address, and a customer's fraud history.
3. A method of claim 1 wherein comparing contact event information with a fraud database further comprises comparing contact event information with a fraud database having a plurality of fraud information sources.
4. The method of claim 1 wherein obtaining contact event information further comprises obtaining contact event information during a purchasing card application process.
5. The method of claim 1 wherein obtaining contact event information further comprises obtaining contact event information during a purchasing card activation process.
6. The method of claim 1 wherein obtaining contact event information further comprises obtaining contact event information during a purchasing card mail order transaction from a retail participant.
7. The method of claim 1 wherein obtaining contact event information further comprises obtaining contact event information during a purchasing card phone order transaction.
8. A method of claim 1 wherein obtaining contact event information further comprises obtaining contact event information during an address change process.
9. The method of claim 1 wherein sending an alert further comprises sending an account record to an online queue to be monitored by the client.
10. The method of claim 9 wherein sending an account record further comprises suspending the contact event until a manual follow-up is completed.
11. The method of claim 1 further comprising scoring the fraud match to assist in the fraud determination process.
12. The method of claim 11 wherein the scoring further comprises predicting a likelihood of a fraudulent takeover of a cardholder account.
13. The method of claim 1 further comprising suspending purchasing card generation when a fraud match occurs.
14. A system for detecting purchasing card fraud during all phases of a purchasing card life cycle, the system comprising: a computer database for receiving contact event information from a client; computer software in communication with the computer database for comparing the contact event information with information stored in the database; and a communication network for sending a fraud alert to a client in real time for informing the client that a fraud match has occurred.
15. A system of claim 14 wherein the contact event information further comprises a customer's name, a customer's social security number, customer's address, and a customer's fraud history.
16. A system of claim 14 wherein the fraud database has a plurality of fraud information sources.
17. The system of claim 14 wherein the computer database receives the contact event information during a purchasing card application process.
18. The system of claim 14 wherein the computer database receives the contact event information during a purchasing card activation process.
19. The system of claim 14 wherein the computer database receives the contact event information during a purchasing card mail order transaction from a retail participant.
20. The system of claim 14 wherein the computer database receives the contact event information during a purchasing card phone order transaction.
21. The system of claim 14 wherein the computer database receives the contact event information during an address change process.
22. The system of claim 14 wherein the fraud alert is an account record which is sent to an online queue monitored by a client.
23. The system of claim 22 wherein sending an account record further comprises suspending the contact event until a manual follow-up is completed.
24. The system of claim 14 further comprising scoring the fraud match to assist in the fraud determination process.
25. The system of claim 24 wherein the scoring the fraud match further comprises predicting a likelihood of a fraudulent takeover of a cardholder account.
26. The system of claim 14 wherein purchasing card generation is suspended when a fraud match occurs.
PCT/US1999/024836 1998-10-26 1999-10-25 System and method for detecting purchasing card fraud WO2000025251A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10561198P 1998-10-26 1998-10-26
US60/105,611 1998-10-26

Publications (1)

Publication Number Publication Date
WO2000025251A1 true WO2000025251A1 (en) 2000-05-04

Family

ID=22306822

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/024836 WO2000025251A1 (en) 1998-10-26 1999-10-25 System and method for detecting purchasing card fraud

Country Status (1)

Country Link
WO (1) WO2000025251A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SG104342A1 (en) * 2002-07-17 2004-06-21 Kam Fu Wong A security system
EP1464018A1 (en) * 2001-10-29 2004-10-06 Equifax, Inc. System and method for facilitating reciprocative small business financial information exchanges
ES2338403A1 (en) * 2009-06-02 2010-05-06 Micro Codigos, S.L. System for communicating with smart cards provided with storage and/or processing functions and card reader for said system
US7747521B2 (en) 2006-02-22 2010-06-29 First American Corelogic, Inc. System and method for monitoring events associated with a person or property
US8015037B2 (en) 2008-07-01 2011-09-06 Corelogic Information Solutions, Inc. System and method for tracking, monitoring and reporting extinguishment of a title insurance policy
US8224745B2 (en) 2006-06-13 2012-07-17 Corelogic Tax Services, Llc Automatic delinquency item processing with customization for lenders
EP3955141A1 (en) * 2020-07-19 2022-02-16 Synamedia Limited Adaptive validation and remediation systems and methods for credential fraud

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5239462A (en) * 1992-02-25 1993-08-24 Creative Solutions Groups, Inc. Method and apparatus for automatically determining the approval status of a potential borrower
US5774882A (en) * 1992-03-12 1998-06-30 Keen; Regina D. Credit approval system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5239462A (en) * 1992-02-25 1993-08-24 Creative Solutions Groups, Inc. Method and apparatus for automatically determining the approval status of a potential borrower
US5774882A (en) * 1992-03-12 1998-06-30 Keen; Regina D. Credit approval system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
CREDIT CONTROL, vol. 17, no. 6, 1996, pages 27 - 31 *
CREDIT RISK MANAGEMENT REPORT, vol. 3, no. 19, 27 September 1993 (1993-09-27) *
DATABASE ABI/INFORM [online] CRAFTON D.: "Analysing customers with behavioral modelling", XP002956020, accession no. Dialog Database accession no. 99-14691 *
DATABASE IAC NEWSLETTER DB (636) [online] "Five ways to reduce risk with neural networks", XP002956019, accession no. Dialog Database accession no. 02020764 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1464018A1 (en) * 2001-10-29 2004-10-06 Equifax, Inc. System and method for facilitating reciprocative small business financial information exchanges
US7536346B2 (en) 2001-10-29 2009-05-19 Equifax, Inc. System and method for facilitating reciprocative small business financial information exchanges
SG104342A1 (en) * 2002-07-17 2004-06-21 Kam Fu Wong A security system
US7747521B2 (en) 2006-02-22 2010-06-29 First American Corelogic, Inc. System and method for monitoring events associated with a person or property
US7835986B2 (en) 2006-02-22 2010-11-16 Corelogic Information Solutions, Inc. System and method for monitoring events associated with a person or property
US8224745B2 (en) 2006-06-13 2012-07-17 Corelogic Tax Services, Llc Automatic delinquency item processing with customization for lenders
US8548831B2 (en) * 2008-07-01 2013-10-01 Corelogic Solutions, Llc System and method for tracking, monitoring and reporting extinguishment of a title insurance policy
US8015037B2 (en) 2008-07-01 2011-09-06 Corelogic Information Solutions, Inc. System and method for tracking, monitoring and reporting extinguishment of a title insurance policy
US20110282699A1 (en) * 2008-07-01 2011-11-17 Corelogic Information Solutions, Inc. System and Method for Tracking, Monitoring and Reporting Extinguishment of a Title Insurance Policy
ES2338403A1 (en) * 2009-06-02 2010-05-06 Micro Codigos, S.L. System for communicating with smart cards provided with storage and/or processing functions and card reader for said system
WO2010139830A1 (en) * 2009-06-02 2010-12-09 Micro Códigos, S. L. System for communicating with smart cards provided with storage and/or processing functions and card reader for said system
EP3955141A1 (en) * 2020-07-19 2022-02-16 Synamedia Limited Adaptive validation and remediation systems and methods for credential fraud
US11704679B2 (en) 2020-07-19 2023-07-18 Synamedia Limited Adaptive validation and remediation systems and methods for credential fraud

Similar Documents

Publication Publication Date Title
US7337119B1 (en) System and method for detecting purchasing card fraud
US6418436B1 (en) Scoring methodology for purchasing card fraud detection
US20230177635A1 (en) System, Method and Computer Program Product for Assessing Risk of Identity Theft
US10319028B2 (en) Payment account monitoring system and method
US7313545B2 (en) System and method for detecting fraudulent calls
US6783065B2 (en) Purchasing card transaction risk model
US8296232B2 (en) Systems and methods for screening payment transactions
US5950179A (en) Method and system for issuing a secured credit card
CA2442629C (en) Systems and methods for notifying a consumer of changes made to a credit report
US8170953B1 (en) Systems and method for screening payment transactions
US20030009426A1 (en) Methods and apparatus for protecting against credit card fraud, check fraud, and identity theft
EP2410484A1 (en) Systems and methods for notifying a consumer of changes made to a credit report
US20030195859A1 (en) System and methods for authenticating and monitoring transactions
US20030212796A1 (en) Loadable debit card system and method
US20140207637A1 (en) System and Method for Using Credit/Debit Card Transaction Data to Determine Financial Health of a Merchant
US20040215543A1 (en) Systems and methods for providing enhanced merchant contact detail for credit and debit card transactions
CA2557132C (en) Computer-implemented method, system and apparatus for the dynamic verification of a consumer engaged in a transaction with a merchant and authorization of the transaction
US20130282562A1 (en) Systems and methods for preventing fraudulent purchases
US20190287088A1 (en) System and method for setting a hot product alert on transaction data
WO2000025251A1 (en) System and method for detecting purchasing card fraud
WO2002059849A1 (en) Method and system for preventing credit card fraud
JP2009301397A (en) Real credit decision device for credit card and method thereof

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CA CN JP MX

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: COMMUNICATION PURSUANT TO RULE 85A(1) EPC AND RULES 85A AND 85B EPC

122 Ep: pct application non-entry in european phase